java.security 37 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893
  1. # ===========================================================================
  2. # Licensed Materials - Property of IBM
  3. # "Restricted Materials of IBM"
  4. #
  5. # IBM SDK, Java(tm) Technology Edition, v8
  6. # (C) Copyright IBM Corp. 2010, 2014. All Rights Reserved
  7. #
  8. # US Government Users Restricted Rights - Use, duplication or disclosure
  9. # restricted by GSA ADP Schedule Contract with IBM Corp.
  10. # ===========================================================================
  11. #
  12. # This is the "master security properties file".
  13. #
  14. # An alternate java.security properties file may be specified
  15. # from the command line via the system property
  16. #
  17. # -Djava.security.properties=<URL>
  18. #
  19. # This properties file appends to the master security properties file.
  20. # If both properties files specify values for the same key, the value
  21. # from the command-line properties file is selected, as it is the last
  22. # one loaded.
  23. #
  24. # Also, if you specify
  25. #
  26. # -Djava.security.properties==<URL> (2 equals),
  27. #
  28. # then that properties file completely overrides the master security
  29. # properties file.
  30. #
  31. # To disable the ability to specify an additional properties file from
  32. # the command line, set the key security.overridePropertiesFile
  33. # to false in the master security properties file. It is set to true
  34. # by default.
  35. # In this file, various security properties are set for use by
  36. # java.security classes. This is where users can statically register
  37. # Cryptography Package Providers ("providers" for short). The term
  38. # "provider" refers to a package or set of packages that supply a
  39. # concrete implementation of a subset of the cryptography aspects of
  40. # the Java Security API. A provider may, for example, implement one or
  41. # more digital signature algorithms or message digest algorithms.
  42. #
  43. # Each provider must implement a subclass of the Provider class.
  44. # To register a provider in this master security properties file,
  45. # specify the Provider subclass name and priority in the format
  46. #
  47. # security.provider.<n>=<className>
  48. #
  49. # This declares a provider, and specifies its preference
  50. # order n. The preference order is the order in which providers are
  51. # searched for requested algorithms (when no specific provider is
  52. # requested). The order is 1-based; 1 is the most preferred, followed
  53. # by 2, and so on.
  54. #
  55. # <className> must specify the subclass of the Provider class whose
  56. # constructor sets the values of various properties that are required
  57. # for the Java Security API to look up the algorithms or other
  58. # facilities implemented by the provider.
  59. #
  60. # There must be at least one provider specification in java.security.
  61. # There is a default provider that comes standard with the JDK. It
  62. # is called the "SUN" provider, and its Provider subclass
  63. # named Sun appears in the sun.security.provider package. Thus, the
  64. # "SUN" provider is registered via the following:
  65. #
  66. # security.provider.1=sun.security.provider.Sun
  67. #
  68. # (The number 1 is used for the default provider.)
  69. #
  70. # Note: Providers can be dynamically registered instead by calls to
  71. # either the addProvider or insertProviderAt method in the Security
  72. # class.
  73. #
  74. # List of providers and their preference orders (see above):
  75. #
  76. security.provider.1=com.ibm.jsse2.IBMJSSEProvider2
  77. security.provider.2=com.ibm.crypto.provider.IBMJCE
  78. security.provider.3=com.ibm.security.jgss.IBMJGSSProvider
  79. security.provider.4=com.ibm.security.cert.IBMCertPath
  80. security.provider.5=com.ibm.security.sasl.IBMSASL
  81. security.provider.6=com.ibm.xml.crypto.IBMXMLCryptoProvider
  82. security.provider.7=com.ibm.xml.enc.IBMXMLEncProvider
  83. security.provider.8=com.ibm.security.jgss.mech.spnego.IBMSPNEGO
  84. security.provider.9=sun.security.provider.Sun
  85. #
  86. # IBMJCE and IBMSecureRandom SecureRandom seed source.
  87. #
  88. # Select the primary source of seed data for the "SHA1PRNG" and
  89. # "NativePRNG" SecureRandom implementations in the "IBMJCE"
  90. # provider and the "SHA1PRNG" SecureRandom implementation
  91. # in the "IBMSecureRandom" provider.
  92. # (Other SecureRandom implementations might also use this property.)
  93. #
  94. # On Unix-like systems (for example, Solaris/Linux/MacOS), the
  95. # "NativePRNG" and "SHA1PRNG" implementations obtains seed data from
  96. # special device files such as file:/dev/random.
  97. #
  98. # On Windows systems, specifying the URLs "file:/dev/random" or
  99. # "file:/dev/urandom" will enable the native Microsoft CryptoAPI seeding
  100. # mechanism for SHA1PRNG.
  101. #
  102. # By default, an attempt is made to use the entropy gathering device
  103. # specified by the "securerandom.source" Security property. If an
  104. # exception occurs while accessing the specified URL:
  105. #
  106. # SHA1PRNG:
  107. # the traditional system/thread activity algorithm will be used.
  108. #
  109. # NativePRNG:
  110. # a default value of /dev/random will be used. If neither
  111. # are available, the implementation will be disabled.
  112. # "file" is the only currently supported protocol type.
  113. #
  114. # The entropy gathering device can also be specified with the System
  115. # property "java.security.egd". For example:
  116. #
  117. # % java -Djava.security.egd=file:/dev/random MainClass
  118. #
  119. # Specifying this System property will override the
  120. # "securerandom.source" Security property.
  121. #
  122. # In addition, if "file:/dev/random" or "file:/dev/urandom" is
  123. # specified, the "NativePRNG" implementation will be more preferred than
  124. # SHA1PRNG in the IBMJCE provider.
  125. #
  126. securerandom.source=file:/dev/urandom
  127. #
  128. # A list of known strong SecureRandom implementations.
  129. #
  130. # To help guide applications in selecting a suitable strong
  131. # java.security.SecureRandom implementation, Java distributions should
  132. # indicate a list of known strong implementations using the property.
  133. #
  134. # This is a comma-separated list of algorithm and/or algorithm:provider
  135. # entries.
  136. #
  137. securerandom.strongAlgorithms=SHA2DRBG:IBMJCE
  138. #
  139. # Class to instantiate as the javax.security.auth.login.Configuration
  140. # provider.
  141. #
  142. login.configuration.provider=com.ibm.security.auth.login.ConfigFile
  143. #
  144. # Default login configuration file
  145. #
  146. #login.config.url.1=file:${user.home}/.java.login.config
  147. #
  148. # Class to instantiate as the system Policy. This is the name of the class
  149. # that will be used as the Policy object.
  150. #
  151. policy.provider=sun.security.provider.PolicyFile
  152. # The default is to have a single system-wide policy file,
  153. # and a policy file in the user's home directory.
  154. policy.url.1=file:${java.home}/lib/security/java.policy
  155. policy.url.2=file:${java.home}/lib/security/java.pol
  156. policy.url.3=file:///${user.home}/.java.policy
  157. # whether or not we expand properties in the policy file
  158. # if this is set to false, properties (${...}) will not be expanded in policy
  159. # files.
  160. policy.expandProperties=true
  161. # whether or not we allow an extra policy to be passed on the command line
  162. # with -Djava.security.policy=somefile. Comment out this line to disable
  163. # this feature.
  164. policy.allowSystemProperty=true
  165. # whether or not we look into the IdentityScope for trusted Identities
  166. # when encountering a 1.1 signed JAR file. If the identity is found
  167. # and is trusted, we grant it AllPermission.
  168. policy.ignoreIdentityScope=false
  169. #
  170. # Default keystore type.
  171. #
  172. keystore.type=jks
  173. #
  174. # Controls compatibility mode for the JKS keystore type.
  175. #
  176. # When set to 'true', the JKS keystore type supports loading
  177. # keystore files in either JKS or PKCS12 format. When set to 'false'
  178. # it supports loading only JKS keystore files.
  179. #
  180. keystore.type.compat=true
  181. #
  182. # List of comma-separated packages that start with or equal this string
  183. # will cause a security exception to be thrown when
  184. # passed to checkPackageAccess unless the
  185. # corresponding RuntimePermission ("accessClassInPackage."+package) has
  186. # been granted.
  187. package.access=sun.,\
  188. com.ibm.oti.,\
  189. com.intel.fortress.,\
  190. com.sun.xml.internal.,\
  191. com.sun.imageio.,\
  192. com.sun.istack.internal.,\
  193. com.sun.jmx.,\
  194. com.sun.media.sound.,\
  195. com.sun.naming.internal.,\
  196. com.sun.proxy.,\
  197. com.sun.corba.se.,\
  198. com.sun.org.apache.bcel.internal.,\
  199. com.sun.org.apache.regexp.internal.,\
  200. com.sun.org.apache.xerces.internal.,\
  201. com.sun.org.apache.xpath.internal.,\
  202. com.sun.org.apache.xalan.internal.extensions.,\
  203. com.sun.org.apache.xalan.internal.lib.,\
  204. com.sun.org.apache.xalan.internal.res.,\
  205. com.sun.org.apache.xalan.internal.templates.,\
  206. com.sun.org.apache.xalan.internal.utils.,\
  207. com.sun.org.apache.xalan.internal.xslt.,\
  208. com.sun.org.apache.xalan.internal.xsltc.cmdline.,\
  209. com.sun.org.apache.xalan.internal.xsltc.compiler.,\
  210. com.sun.org.apache.xalan.internal.xsltc.trax.,\
  211. com.sun.org.apache.xalan.internal.xsltc.util.,\
  212. com.sun.org.apache.xml.internal.res.,\
  213. com.sun.org.apache.xml.internal.security.,\
  214. com.sun.org.apache.xml.internal.serializer.utils.,\
  215. com.sun.org.apache.xml.internal.utils.,\
  216. com.sun.org.glassfish.,\
  217. com.oracle.xmlns.internal.,\
  218. com.oracle.webservices.internal.,\
  219. com.ibm.stax.,\
  220. com.ibm.xml.jaxp.datatype.,\
  221. com.ibm.xml.resolver.,\
  222. com.ibm.xml.xlxp.api.event.,\
  223. com.ibm.xml.xlxp.api.jaxp.impl.,\
  224. com.ibm.xml.xlxp.api.sax.impl.,\
  225. com.ibm.xml.xlxp.api.stax.events.,\
  226. com.ibm.xml.xlxp.api.stax.msg.,\
  227. com.ibm.xml.xlxp.api.stax.serializer.,\
  228. com.ibm.xml.xlxp.api.util.,\
  229. com.ibm.xml.xlxp.scan.msg.,\
  230. com.ibm.xml.xlxp.scan.util.,\
  231. com.ibm.xtq.ast.parsers.xpath.,\
  232. com.ibm.xtq.ast.parsers.xslt.,\
  233. com.ibm.xtq.ast.res.,\
  234. com.ibm.xtq.ast.visit.,\
  235. com.ibm.xtq.bcel.,\
  236. com.ibm.xtq.common.utils.,\
  237. com.ibm.xtq.utils.,\
  238. com.ibm.xtq.xml.datamodel.,\
  239. com.ibm.xtq.xml.dtm.ref.sax2dtm.,\
  240. com.ibm.xtq.xml.dtm.utils.,\
  241. com.ibm.xtq.xml.experimental.,\
  242. com.ibm.xtq.xml.res.,\
  243. com.ibm.xtq.xml.types.,\
  244. com.ibm.xtq.xml.unicode.normalize.,\
  245. com.ibm.xtq.xml.utils.,\
  246. com.ibm.xtq.xml.xdm.dom.,\
  247. com.ibm.xtq.xml.xdm.ref.,\
  248. com.ibm.xtq.xml.xdm.res.,\
  249. com.ibm.xtq.xpath.jaxp.,\
  250. com.ibm.xtq.xslt.cmdline.,\
  251. com.ibm.xtq.xslt.jaxp.interpreter.,\
  252. com.ibm.xtq.xslt.res.,\
  253. com.ibm.xtq.xslt.runtime.debug.,\
  254. com.ibm.xtq.xslt.runtime.output.,\
  255. com.ibm.xtq.xslt.runtime.res.,\
  256. com.ibm.xtq.xslt.runtime.v2.,\
  257. com.ibm.xtq.xslt.translator.v1.,\
  258. com.ibm.xtq.xslt.translator.v2.,\
  259. com.ibm.xtq.xslt.typechecker.,\
  260. com.ibm.xtq.xslt.xylem.autof.,\
  261. com.ibm.xtq.xslt.xylem.codegen.,\
  262. com.ibm.xtq.xslt.xylem.interpreter.,\
  263. com.ibm.xtq.xslt.xylem.optimizers.,\
  264. com.ibm.xtq.xslt.xylem.parser.,\
  265. com.ibm.xtq.xslt.xylem.partialeval.,\
  266. com.ibm.xtq.xslt.xylem.types.,\
  267. com.ibm.xtq.xslt.xylem.xpath20.analysis.,\
  268. com.ibm.xtq.xslt.xylem.xpath20.parser.,\
  269. com.ibm.xtq.xslt.xylem.xpath20.typesystem.,\
  270. com.ibm.xylem.annot.meta.,\
  271. com.ibm.xylem.builders.,\
  272. com.ibm.xylem.codegen.,\
  273. com.ibm.xylem.commandline.,\
  274. com.ibm.xylem.config.,\
  275. com.ibm.xylem.drivers.,\
  276. com.ibm.xylem.interpreter.,\
  277. com.ibm.xylem.parser.,\
  278. com.ibm.xylem.res.,\
  279. com.ibm.xylem.types.,\
  280. com.ibm.xylem.utils.,\
  281. com.sun.org.apache.xalan.internal.xsltc.trax.,\
  282. com.sun.org.apache.xerces.internal.dom.,\
  283. com.sun.org.apache.xerces.internal.jaxp.,\
  284. com.sun.org.apache.xerces.internal.parsers.,\
  285. com.sun.org.apache.xpath.internal.jaxp.,\
  286. com.sun.xml.internal.stream.,\
  287. org.apache.html.dom.,\
  288. org.apache.wml.,\
  289. org.apache.xalan.client.,\
  290. org.apache.xalan.extensions.,\
  291. org.apache.xalan.lib.sql.,\
  292. org.apache.xalan.res.,\
  293. org.apache.xalan.serialize.,\
  294. org.apache.xalan.templates.,\
  295. org.apache.xalan.trace.,\
  296. org.apache.xalan.transformer.,\
  297. org.apache.xalan.xslt.,\
  298. org.apache.xalan.xsltc.cmdline.,\
  299. org.apache.xerces.dom.events.,\
  300. org.apache.xerces.dom3.as.,\
  301. org.apache.xerces.impl.dtd.,\
  302. org.apache.xerces.impl.dv.util.,\
  303. org.apache.xerces.impl.io.,\
  304. org.apache.xerces.impl.msg.,\
  305. org.apache.xerces.impl.validation.,\
  306. org.apache.xerces.impl.xpath.,\
  307. org.apache.xerces.impl.xs.,\
  308. org.apache.xerces.util.,\
  309. org.apache.xerces.xinclude.,\
  310. org.apache.xerces.xni.grammars.,\
  311. org.apache.xerces.xpointer.,\
  312. org.apache.xerces.xs.datatypes.,\
  313. org.apache.xml.dtm.ref.dom2dtm.,\
  314. org.apache.xml.dtm.ref.sax2dtm.,\
  315. org.apache.xml.res.,\
  316. org.apache.xml.serializer.charmap.,\
  317. org.apache.xml.serializer.dom3.,\
  318. org.apache.xml.serializer.unicode.,\
  319. org.apache.xml.serializer.utils.,\
  320. org.apache.xml.utils.,\
  321. org.apache.xmlcommons.,\
  322. org.apache.xpath.axes.,\
  323. org.apache.xpath.compiler.,\
  324. org.apache.xpath.functions.,\
  325. org.apache.xpath.objects.,\
  326. org.apache.xpath.operations.,\
  327. org.apache.xpath.patterns.,\
  328. org.apache.xpath.res.,\
  329. oracle.jrockit.jfr.,\
  330. org.jcp.xml.dsig.internal.,\
  331. com.ibm.rmi.channel.,\
  332. com.ibm.rmi.corba.,\
  333. com.ibm.rmi.iiop.,\
  334. com.ibm.rmi.io.,\
  335. com.ibm.rmi.pi.,\
  336. com.ibm.rmi.poa.,\
  337. com.ibm.rmi.ras.,\
  338. com.ibm.rmi.transport.,\
  339. com.ibm.rmi.util.,\
  340. jdk.internal.,\
  341. jdk.nashorn.internal.,\
  342. jdk.nashorn.tools.,\
  343. com.sun.activation.registries.,\
  344. com.sun.browser.,\
  345. com.sun.glass.,\
  346. com.sun.javafx.,\
  347. com.sun.media.,\
  348. com.sun.openpisces.,\
  349. com.sun.prism.,\
  350. com.sun.scenario.,\
  351. com.sun.t2k.,\
  352. com.sun.pisces.,\
  353. com.sun.webkit.,\
  354. jdk.management.resource.internal.
  355. #
  356. # List of comma-separated packages that start with or equal this string
  357. # will cause a security exception to be thrown when
  358. # passed to checkPackageDefinition unless the
  359. # corresponding RuntimePermission ("defineClassInPackage."+package) has
  360. # been granted.
  361. #
  362. # by default, none of the class loaders supplied with the JDK call
  363. # checkPackageDefinition.
  364. #
  365. package.definition=sun.,\
  366. com.sun.xml.internal.,\
  367. com.sun.imageio.,\
  368. com.sun.istack.internal.,\
  369. com.sun.jmx.,\
  370. com.sun.media.sound.,\
  371. com.sun.naming.internal.,\
  372. com.sun.proxy.,\
  373. com.sun.corba.se.,\
  374. com.sun.org.apache.bcel.internal.,\
  375. com.sun.org.apache.regexp.internal.,\
  376. com.sun.org.apache.xerces.internal.,\
  377. com.sun.org.apache.xpath.internal.,\
  378. com.sun.org.apache.xalan.internal.extensions.,\
  379. com.sun.org.apache.xalan.internal.lib.,\
  380. com.sun.org.apache.xalan.internal.res.,\
  381. com.sun.org.apache.xalan.internal.templates.,\
  382. com.sun.org.apache.xalan.internal.utils.,\
  383. com.sun.org.apache.xalan.internal.xslt.,\
  384. com.sun.org.apache.xalan.internal.xsltc.cmdline.,\
  385. com.sun.org.apache.xalan.internal.xsltc.compiler.,\
  386. com.sun.org.apache.xalan.internal.xsltc.trax.,\
  387. com.sun.org.apache.xalan.internal.xsltc.util.,\
  388. com.sun.org.apache.xml.internal.res.,\
  389. com.sun.org.apache.xml.internal.security.,\
  390. com.sun.org.apache.xml.internal.serializer.utils.,\
  391. com.sun.org.apache.xml.internal.utils.,\
  392. com.sun.org.glassfish.,\
  393. com.oracle.xmlns.internal.,\
  394. com.oracle.webservices.internal.,\
  395. com.ibm.stax.,\
  396. com.ibm.xml.jaxp.datatype.,\
  397. com.ibm.xml.resolver.,\
  398. com.ibm.xml.xlxp.api.event.,\
  399. com.ibm.xml.xlxp.api.jaxp.impl.,\
  400. com.ibm.xml.xlxp.api.sax.impl.,\
  401. com.ibm.xml.xlxp.api.stax.events.,\
  402. com.ibm.xml.xlxp.api.stax.msg.,\
  403. com.ibm.xml.xlxp.api.stax.serializer.,\
  404. com.ibm.xml.xlxp.api.util.,\
  405. com.ibm.xml.xlxp.scan.msg.,\
  406. com.ibm.xml.xlxp.scan.util.,\
  407. com.ibm.xtq.ast.parsers.xpath.,\
  408. com.ibm.xtq.ast.parsers.xslt.,\
  409. com.ibm.xtq.ast.res.,\
  410. com.ibm.xtq.ast.visit.,\
  411. com.ibm.xtq.bcel.,\
  412. com.ibm.xtq.common.utils.,\
  413. com.ibm.xtq.utils.,\
  414. com.ibm.xtq.xml.datamodel.,\
  415. com.ibm.xtq.xml.dtm.ref.sax2dtm.,\
  416. com.ibm.xtq.xml.dtm.utils.,\
  417. com.ibm.xtq.xml.experimental.,\
  418. com.ibm.xtq.xml.res.,\
  419. com.ibm.xtq.xml.types.,\
  420. com.ibm.xtq.xml.unicode.normalize.,\
  421. com.ibm.xtq.xml.utils.,\
  422. com.ibm.xtq.xml.xdm.dom.,\
  423. com.ibm.xtq.xml.xdm.ref.,\
  424. com.ibm.xtq.xml.xdm.res.,\
  425. com.ibm.xtq.xpath.jaxp.,\
  426. com.ibm.xtq.xslt.cmdline.,\
  427. com.ibm.xtq.xslt.jaxp.interpreter.,\
  428. com.ibm.xtq.xslt.res.,\
  429. com.ibm.xtq.xslt.runtime.debug.,\
  430. com.ibm.xtq.xslt.runtime.output.,\
  431. com.ibm.xtq.xslt.runtime.res.,\
  432. com.ibm.xtq.xslt.runtime.v2.,\
  433. com.ibm.xtq.xslt.translator.v1.,\
  434. com.ibm.xtq.xslt.translator.v2.,\
  435. com.ibm.xtq.xslt.typechecker.,\
  436. com.ibm.xtq.xslt.xylem.autof.,\
  437. com.ibm.xtq.xslt.xylem.codegen.,\
  438. com.ibm.xtq.xslt.xylem.interpreter.,\
  439. com.ibm.xtq.xslt.xylem.optimizers.,\
  440. com.ibm.xtq.xslt.xylem.parser.,\
  441. com.ibm.xtq.xslt.xylem.partialeval.,\
  442. com.ibm.xtq.xslt.xylem.types.,\
  443. com.ibm.xtq.xslt.xylem.xpath20.analysis.,\
  444. com.ibm.xtq.xslt.xylem.xpath20.parser.,\
  445. com.ibm.xtq.xslt.xylem.xpath20.typesystem.,\
  446. com.ibm.xylem.annot.meta.,\
  447. com.ibm.xylem.builders.,\
  448. com.ibm.xylem.codegen.,\
  449. com.ibm.xylem.commandline.,\
  450. com.ibm.xylem.config.,\
  451. com.ibm.xylem.drivers.,\
  452. com.ibm.xylem.interpreter.,\
  453. com.ibm.xylem.parser.,\
  454. com.ibm.xylem.res.,\
  455. com.ibm.xylem.types.,\
  456. com.ibm.xylem.utils.,\
  457. com.sun.org.apache.xalan.internal.xsltc.trax.,\
  458. com.sun.org.apache.xerces.internal.dom.,\
  459. com.sun.org.apache.xerces.internal.jaxp.,\
  460. com.sun.org.apache.xerces.internal.parsers.,\
  461. com.sun.org.apache.xpath.internal.jaxp.,\
  462. com.sun.xml.internal.stream.,\
  463. org.apache.html.dom.,\
  464. org.apache.wml.,\
  465. org.apache.xalan.client.,\
  466. org.apache.xalan.extensions.,\
  467. org.apache.xalan.lib.sql.,\
  468. org.apache.xalan.res.,\
  469. org.apache.xalan.serialize.,\
  470. org.apache.xalan.templates.,\
  471. org.apache.xalan.trace.,\
  472. org.apache.xalan.transformer.,\
  473. org.apache.xalan.xslt.,\
  474. org.apache.xalan.xsltc.cmdline.,\
  475. org.apache.xerces.dom.events.,\
  476. org.apache.xerces.dom3.as.,\
  477. org.apache.xerces.impl.dtd.,\
  478. org.apache.xerces.impl.dv.util.,\
  479. org.apache.xerces.impl.io.,\
  480. org.apache.xerces.impl.msg.,\
  481. org.apache.xerces.impl.validation.,\
  482. org.apache.xerces.impl.xpath.,\
  483. org.apache.xerces.impl.xs.,\
  484. org.apache.xerces.util.,\
  485. org.apache.xerces.xinclude.,\
  486. org.apache.xerces.xni.grammars.,\
  487. org.apache.xerces.xpointer.,\
  488. org.apache.xerces.xs.datatypes.,\
  489. org.apache.xml.dtm.ref.dom2dtm.,\
  490. org.apache.xml.dtm.ref.sax2dtm.,\
  491. org.apache.xml.res.,\
  492. org.apache.xml.serializer.charmap.,\
  493. org.apache.xml.serializer.dom3.,\
  494. org.apache.xml.serializer.unicode.,\
  495. org.apache.xml.serializer.utils.,\
  496. org.apache.xml.utils.,\
  497. org.apache.xmlcommons.,\
  498. org.apache.xpath.axes.,\
  499. org.apache.xpath.compiler.,\
  500. org.apache.xpath.functions.,\
  501. org.apache.xpath.objects.,\
  502. org.apache.xpath.operations.,\
  503. org.apache.xpath.patterns.,\
  504. org.apache.xpath.res.,\
  505. oracle.jrockit.jfr.,\
  506. org.jcp.xml.dsig.internal.,\
  507. jdk.internal.,\
  508. jdk.nashorn.internal.,\
  509. jdk.nashorn.tools.,\
  510. com.sun.activation.registries.,\
  511. com.sun.browser.,\
  512. com.sun.glass.,\
  513. com.sun.javafx.,\
  514. com.sun.media.,\
  515. com.sun.openpisces.,\
  516. com.sun.prism.,\
  517. com.sun.scenario.,\
  518. com.sun.t2k.,\
  519. com.sun.pisces.,\
  520. com.sun.webkit.,\
  521. jdk.management.resource.internal.
  522. #
  523. # Determines whether this properties file can be appended to
  524. # or overridden on the command line via -Djava.security.properties
  525. #
  526. security.overridePropertiesFile=true
  527. #
  528. # Determines the default key and trust manager factory algorithms for
  529. # the javax.net.ssl package.
  530. #
  531. ssl.KeyManagerFactory.algorithm=IbmX509
  532. ssl.TrustManagerFactory.algorithm=PKIX
  533. #
  534. # The Java-level namelookup cache policy for successful lookups:
  535. #
  536. # any negative value: caching forever
  537. # any positive value: the number of seconds to cache an address for
  538. # zero: do not cache
  539. #
  540. # default value is forever (FOREVER). For security reasons, this
  541. # caching is made forever when a security manager is set. When a security
  542. # manager is not set, the default behavior in this implementation
  543. # is to cache for 30 seconds.
  544. #
  545. # NOTE: setting this to anything other than the default value can have
  546. # serious security implications. Do not set it unless
  547. # you are sure you are not exposed to DNS spoofing attack.
  548. #
  549. #networkaddress.cache.ttl=-1
  550. # The Java-level namelookup cache policy for failed lookups:
  551. #
  552. # any negative value: cache forever
  553. # any positive value: the number of seconds to cache negative lookup results
  554. # zero: do not cache
  555. #
  556. # In some Microsoft Windows networking environments that employ
  557. # the WINS name service in addition to DNS, name service lookups
  558. # that fail may take a noticeably long time to return (approx. 5 seconds).
  559. # For this reason the default caching policy is to maintain these
  560. # results for 10 seconds.
  561. #
  562. #
  563. networkaddress.cache.negative.ttl=10
  564. #
  565. # Properties to configure OCSP for certificate revocation checking
  566. #
  567. # Enable OCSP
  568. #
  569. # By default, OCSP is not used for certificate revocation checking.
  570. # This property enables the use of OCSP when set to the value "true".
  571. #
  572. # NOTE: SocketPermission is required to connect to an OCSP responder.
  573. #
  574. # Example,
  575. # ocsp.enable=true
  576. #
  577. # Location of the OCSP responder
  578. #
  579. # By default, the location of the OCSP responder is determined implicitly
  580. # from the certificate being validated. This property explicitly specifies
  581. # the location of the OCSP responder. The property is used when the
  582. # Authority Information Access extension (defined in RFC 3280) is absent
  583. # from the certificate or when it requires overriding.
  584. #
  585. # Example,
  586. # ocsp.responderURL=http://ocsp.example.net:80
  587. #
  588. # Subject name of the OCSP responder's certificate
  589. #
  590. # By default, the certificate of the OCSP responder is that of the issuer
  591. # of the certificate being validated. This property identifies the certificate
  592. # of the OCSP responder when the default does not apply. Its value is a string
  593. # distinguished name (defined in RFC 2253) which identifies a certificate in
  594. # the set of certificates supplied during cert path validation. In cases where
  595. # the subject name alone is not sufficient to uniquely identify the certificate
  596. # then both the "ocsp.responderCertIssuerName" and
  597. # "ocsp.responderCertSerialNumber" properties must be used instead. When this
  598. # property is set then those two properties are ignored.
  599. #
  600. # Example,
  601. # ocsp.responderCertSubjectName="CN=OCSP Responder, O=XYZ Corp"
  602. #
  603. # Issuer name of the OCSP responder's certificate
  604. #
  605. # By default, the certificate of the OCSP responder is that of the issuer
  606. # of the certificate being validated. This property identifies the certificate
  607. # of the OCSP responder when the default does not apply. Its value is a string
  608. # distinguished name (defined in RFC 2253) which identifies a certificate in
  609. # the set of certificates supplied during cert path validation. When this
  610. # property is set then the "ocsp.responderCertSerialNumber" property must also
  611. # be set. When the "ocsp.responderCertSubjectName" property is set then this
  612. # property is ignored.
  613. #
  614. # Example,
  615. # ocsp.responderCertIssuerName="CN=Enterprise CA, O=XYZ Corp"
  616. #
  617. # Serial number of the OCSP responder's certificate
  618. #
  619. # By default, the certificate of the OCSP responder is that of the issuer
  620. # of the certificate being validated. This property identifies the certificate
  621. # of the OCSP responder when the default does not apply. Its value is a string
  622. # of hexadecimal digits (colon or space separators may be present) which
  623. # identifies a certificate in the set of certificates supplied during cert path
  624. # validation. When this property is set then the "ocsp.responderCertIssuerName"
  625. # property must also be set. When the "ocsp.responderCertSubjectName" property
  626. # is set then this property is ignored.
  627. #
  628. # Example,
  629. # ocsp.responderCertSerialNumber=2A:FF:00
  630. #
  631. # Policy for failed Kerberos KDC lookups:
  632. #
  633. # When a KDC is unavailable (network error, service failure, etc), it is
  634. # put inside a blacklist and accessed less often for future requests. The
  635. # value (case-insensitive) for this policy can be:
  636. #
  637. # tryLast
  638. # KDCs in the blacklist are always tried after those not on the list.
  639. #
  640. # tryLess[:max_retries,timeout]
  641. # KDCs in the blacklist are still tried by their order in the configuration,
  642. # but with smaller max_retries and timeout values. max_retries and timeout
  643. # are optional numerical parameters (default 1 and 5000, which means once
  644. # and 5 seconds). Please notes that if any of the values defined here is
  645. # more than what is defined in krb5.conf, it will be ignored.
  646. #
  647. # Whenever a KDC is detected as available, it is removed from the blacklist.
  648. # The blacklist is reset when krb5.conf is reloaded. You can add
  649. # refreshKrb5Config=true to a JAAS configuration file so that krb5.conf is
  650. # reloaded whenever a JAAS authentication is attempted.
  651. #
  652. # Example,
  653. # krb5.kdc.bad.policy = tryLast
  654. # krb5.kdc.bad.policy = tryLess:2,2000
  655. krb5.kdc.bad.policy = tryLast
  656. # Algorithm restrictions for certification path (CertPath) processing
  657. #
  658. # In some environments, certain algorithms or key lengths may be undesirable
  659. # for certification path building and validation. For example, "MD2" is
  660. # generally no longer considered to be a secure hash algorithm. This section
  661. # describes the mechanism for disabling algorithms based on algorithm name
  662. # and/or key length. This includes algorithms used in certificates, as well
  663. # as revocation information such as CRLs and signed OCSP Responses.
  664. #
  665. # The syntax of the disabled algorithm string is described as this Java
  666. # BNF-style:
  667. # DisabledAlgorithms:
  668. # " DisabledAlgorithm { , DisabledAlgorithm } "
  669. #
  670. # DisabledAlgorithm:
  671. # AlgorithmName [Constraint]
  672. #
  673. # AlgorithmName:
  674. # (see below)
  675. #
  676. # Constraint:
  677. # KeySizeConstraint
  678. #
  679. # KeySizeConstraint:
  680. # keySize Operator DecimalInteger
  681. #
  682. # Operator:
  683. # <= | < | == | != | >= | >
  684. #
  685. # DecimalInteger:
  686. # DecimalDigits
  687. #
  688. # DecimalDigits:
  689. # DecimalDigit {DecimalDigit}
  690. #
  691. # DecimalDigit: one of
  692. # 1 2 3 4 5 6 7 8 9 0
  693. #
  694. # The "AlgorithmName" is the standard algorithm name of the disabled
  695. # algorithm. See "Java Cryptography Architecture Standard Algorithm Name
  696. # Documentation" for information about Standard Algorithm Names. Matching
  697. # is performed using a case-insensitive sub-element matching rule. (For
  698. # example, in "SHA1withECDSA" the sub-elements are "SHA1" for hashing and
  699. # "ECDSA" for signatures.) If the assertion "AlgorithmName" is a
  700. # sub-element of the certificate algorithm name, the algorithm will be
  701. # rejected during certification path building and validation. For example,
  702. # the assertion algorithm name "DSA" will disable all certificate algorithms
  703. # that rely on DSA, such as NONEwithDSA, SHA1withDSA. However, the assertion
  704. # will not disable algorithms related to "ECDSA".
  705. #
  706. # A "Constraint" provides further guidance for the algorithm being specified.
  707. # The "KeySizeConstraint" requires a key of a valid size range if the
  708. # "AlgorithmName" is of a key algorithm. The "DecimalInteger" indicates the
  709. # key size specified in number of bits. For example, "RSA keySize <= 1024"
  710. # indicates that any RSA key with key size less than or equal to 1024 bits
  711. # should be disabled, and "RSA keySize < 1024, RSA keySize > 2048" indicates
  712. # that any RSA key with key size less than 1024 or greater than 2048 should
  713. # be disabled. Note that the "KeySizeConstraint" only makes sense to key
  714. # algorithms.
  715. #
  716. # Note: This property is currently used by Oracle's PKIX implementation. It
  717. # is not guaranteed to be examined and used by other implementations.
  718. #
  719. # Example:
  720. # jdk.certpath.disabledAlgorithms=MD2, DSA, RSA keySize < 2048
  721. #
  722. #
  723. jdk.certpath.disabledAlgorithms=MD2, RSA keySize < 1024
  724. # Algorithm restrictions for Secure Socket Layer/Transport Layer Security
  725. # (SSL/TLS) processing
  726. #
  727. # In some environments, certain algorithms or key lengths may be undesirable
  728. # when using SSL/TLS. This section describes the mechanism for disabling
  729. # algorithms during SSL/TLS security parameters negotiation, including
  730. # protocol version negotiation, cipher suites selection, peer authentication
  731. # and key exchange mechanisms.
  732. #
  733. # Disabled algorithms will not be negotiated for SSL/TLS connections, even
  734. # if they are enabled explicitly in an application.
  735. #
  736. # For PKI-based peer authentication and key exchange mechanisms, this list
  737. # of disabled algorithms will also be checked during certification path
  738. # building and validation, including algorithms used in certificates, as
  739. # well as revocation information such as CRLs and signed OCSP Responses.
  740. # This is in addition to the jdk.certpath.disabledAlgorithms property above.
  741. #
  742. # See the specification of "jdk.certpath.disabledAlgorithms" for the
  743. # syntax of the disabled algorithm string.
  744. #
  745. # Note: This property is currently used by Oracle's JSSE implementation.
  746. # It is not guaranteed to be examined and used by other implementations.
  747. #
  748. # Example:
  749. # jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048
  750. jdk.tls.disabledAlgorithms=SSLv3, RC4, DH keySize < 768
  751. # Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS)
  752. # processing in JSSE implementation.
  753. #
  754. # In some environments, a certain algorithm may be undesirable but it
  755. # cannot be disabled because of its use in legacy applications. Legacy
  756. # algorithms may still be supported, but applications should not use them
  757. # as the security strength of legacy algorithms are usually not strong enough
  758. # in practice.
  759. #
  760. # During SSL/TLS security parameters negotiation, legacy algorithms will
  761. # not be negotiated unless there are no other candidates.
  762. #
  763. # The syntax of the disabled algorithm string is described as this Java
  764. # BNF-style:
  765. # LegacyAlgorithms:
  766. # " LegacyAlgorithm { , LegacyAlgorithm } "
  767. #
  768. # LegacyAlgorithm:
  769. # AlgorithmName (standard JSSE algorithm name)
  770. #
  771. # See the specification of security property "jdk.certpath.disabledAlgorithms"
  772. # for the syntax and description of the "AlgorithmName" notation.
  773. #
  774. # Per SSL/TLS specifications, cipher suites have the form:
  775. # SSL_KeyExchangeAlg_WITH_CipherAlg_MacAlg
  776. # or
  777. # TLS_KeyExchangeAlg_WITH_CipherAlg_MacAlg
  778. #
  779. # For example, the cipher suite TLS_RSA_WITH_AES_128_CBC_SHA uses RSA as the
  780. # key exchange algorithm, AES_128_CBC (128 bits AES cipher algorithm in CBC
  781. # mode) as the cipher (encryption) algorithm, and SHA-1 as the message digest
  782. # algorithm for HMAC.
  783. #
  784. # The LegacyAlgorithm can be one of the following standard algorithm names:
  785. # 1. JSSE cipher suite name, e.g., TLS_RSA_WITH_AES_128_CBC_SHA
  786. # 2. JSSE key exchange algorithm name, e.g., RSA
  787. # 3. JSSE cipher (encryption) algorithm name, e.g., AES_128_CBC
  788. # 4. JSSE message digest algorithm name, e.g., SHA
  789. #
  790. # See SSL/TLS specifications and "Java Cryptography Architecture Standard
  791. # Algorithm Name Documentation" for information about the algorithm names.
  792. #
  793. # Note: This property is currently used by Oracle's JSSE implementation.
  794. # It is not guaranteed to be examined and used by other implementations.
  795. # There is no guarantee the property will continue to exist or be of the
  796. # same syntax in future releases.
  797. #
  798. # Example:
  799. # jdk.tls.legacyAlgorithms=DH_anon, DES_CBC, SSL_RSA_WITH_RC4_128_MD5
  800. #
  801. jdk.tls.legacyAlgorithms= \
  802. K_NULL, C_NULL, M_NULL, \
  803. DHE_DSS_EXPORT, DHE_RSA_EXPORT, DH_anon_EXPORT, DH_DSS_EXPORT, \
  804. DH_RSA_EXPORT, RSA_EXPORT, \
  805. DH_anon, ECDH_anon, \
  806. RC4_128, RC4_40, DES_CBC, DES40_CBC
  807. # The pre-defined default finite field Diffie-Hellman ephemeral (DHE)
  808. # parameters for Transport Layer Security (SSL/TLS/DTLS) processing.
  809. #
  810. # In traditional SSL/TLS/DTLS connections where finite field DHE parameters
  811. # negotiation mechanism is not used, the server offers the client group
  812. # parameters, base generator g and prime modulus p, for DHE key exchange.
  813. # It is recommended to use dynamic group parameters. This property defines
  814. # a mechanism that allows you to specify custom group parameters.
  815. #
  816. # The syntax of this property string is described as this Java BNF-style:
  817. # DefaultDHEParameters:
  818. # DefinedDHEParameters { , DefinedDHEParameters }
  819. #
  820. # DefinedDHEParameters:
  821. # "{" DHEPrimeModulus , DHEBaseGenerator "}"
  822. #
  823. # DHEPrimeModulus:
  824. # HexadecimalDigits
  825. #
  826. # DHEBaseGenerator:
  827. # HexadecimalDigits
  828. #
  829. # HexadecimalDigits:
  830. # HexadecimalDigit { HexadecimalDigit }
  831. #
  832. # HexadecimalDigit: one of
  833. # 0 1 2 3 4 5 6 7 8 9 A B C D E F a b c d e f
  834. #
  835. # Whitespace characters are ignored.
  836. #
  837. # The "DefinedDHEParameters" defines the custom group parameters, prime
  838. # modulus p and base generator g, for a particular size of prime modulus p.
  839. # The "DHEPrimeModulus" defines the hexadecimal prime modulus p, and the
  840. # "DHEBaseGenerator" defines the hexadecimal base generator g of a group
  841. # parameter. It is recommended to use safe primes for the custom group
  842. # parameters.
  843. #
  844. # If this property is not defined or the value is empty, the underlying JSSE
  845. # provider's default group parameter is used for each connection.
  846. #
  847. # If the property value does not follow the grammar, or a particular group
  848. # parameter is not valid, the connection will fall back and use the
  849. # underlying JSSE provider's default group parameter.
  850. #
  851. # Note: This property is currently used by OpenJDK's JSSE implementation. It
  852. # is not guaranteed to be examined and used by other implementations.
  853. #
  854. # Example:
  855. # jdk.tls.server.defaultDHEParameters=
  856. # { \
  857. # FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1 \
  858. # 29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD \
  859. # EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245 \
  860. # E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED \
  861. # EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE65381 \
  862. # FFFFFFFF FFFFFFFF, 2}